메뉴 건너뛰기




Volumn , Issue , 2014, Pages 49-56

Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection

Author keywords

adaptability; community of interest; intrusion detection; performance analysis; scalability; Trust management

Indexed keywords

INTRUSION DETECTION; MANAGEMENT; MILITARY OPERATIONS; QUALITY OF SERVICE; SCALABILITY;

EID: 84903831603     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2014.13     Document Type: Conference Paper
Times cited : (50)

References (24)
  • 2
    • 45749109010 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • June
    • H. Yu, M. Kaminsky, P.B. Gibbons, and A.D. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," IEEE/ACM Transactions on Networking, Vol. 16, no. 3, June 2008, pp. 576-589.
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 4
    • 84858050885 scopus 로고    scopus 로고
    • Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
    • J.H. Cho, A. Swami and LR. Chen, "Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks" Network and Computer Applications, Vol. 35, 2012, pp. 1001-1012.
    • (2012) Network and Computer Applications , vol.35 , pp. 1001-1012
    • Cho, J.H.1    Swami, A.2    Chen, L.R.3
  • 6
    • 0141858950 scopus 로고    scopus 로고
    • Analysis of replicated data with repair dependency
    • LR. Chen, and D.C. Wang, "Analysis of Replicated Data with Repair Dependency," The Computer Journal, Vol. 39, no. 9, 1996, pp. 767-779.
    • (1996) The Computer Journal , vol.39 , Issue.9 , pp. 767-779
    • Chen, L.R.1    Wang, D.C.2
  • 8
    • 40849124634 scopus 로고    scopus 로고
    • Performance optimization of region-based group key management in mobile ad hoc networks
    • J.H. Cho, LR. Chen and D.C. Wang, "Performance Optimization of Region-based Group Key Management in Mobile Ad Hoc Networks," Performance Evaluation, Vol. 65, no. 5, 2008, pp. 319-344.
    • (2008) Performance Evaluation , vol.65 , Issue.5 , pp. 319-344
    • Cho, J.H.1    Chen, L.R.2    Wang, D.C.3
  • 9
    • 70749147824 scopus 로고    scopus 로고
    • Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
    • Vancouver, Canada
    • J. H. Cho, A. Swami and I. R. Chen, "Modeling and Analysis of Trust Management for Cognitive Mission-driven Group Communication Systems in Mobile Ad Hoc Networks," Inter. Conf. Computational Science and Engineering, Vancouver, Canada, 2009, pp. 641-650.
    • (2009) Inter. Conf. Computational Science and Engineering , pp. 641-650
    • Cho, J.H.1    Swami, A.2    Chen, I.R.3
  • 10
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • Nov.
    • J.H. Cho, A. Swami and LR. Chen, "A Survey on Trust Management for Mobile Ad Hoc Networks," IEEE Communications Surveys & Tutorials, Vol. 13, No. 4, Nov. 2011, pp. 562-583.
    • (2011) IEEE Communications Surveys & Tutorials , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.H.1    Swami, A.2    Chen, L.R.3
  • 11
    • 84861334371 scopus 로고    scopus 로고
    • Trust computations and trust dynamics in mobile ad hoc networks: A survey
    • K. Govindan and P. Mohapatra, "Trust Computations and Trust Dynamics in Mobile Ad hoc Networks: A Survey," IEEE Communications Surveys & Tutorials, Vol. 14, no. 2, 2012, pp. 279-298.
    • (2012) IEEE Communications Surveys & Tutorials , vol.14 , Issue.2 , pp. 279-298
    • Govindan, K.1    Mohapatra, P.2
  • 12
    • 78649633783 scopus 로고    scopus 로고
    • Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks
    • J.H. Cho, and LR Chen, "Performance Analysis of Hierarchical Group Key Management integrated with Adaptive Intrusion Detection in Mobile Ad Hoc Networks," Performance Evaluation, Vol. 67, 2010.
    • (2010) Performance Evaluation , vol.67
    • Cho, J.H.1    Chen, L.R.2
  • 14
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • F. Bao, I. R. Chen, M. Chang, and J. H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection," IEEE Transactions on Network and Service Management, Vol. 9, no. 2, 2012, pp. 161-183.
    • (2012) IEEE Transactions on Network and Service Management , vol.9 , Issue.2 , pp. 161-183
    • Bao, F.1    Chen, I.R.2    Chang, M.3    Cho, J.H.4
  • 16
    • 29844435578 scopus 로고    scopus 로고
    • A localized trust management scheme for ad hoc networks
    • C.R. Davis, "A Localized Trust Management Scheme for Ad Hoc Networks," Inter. Conference on Networking, 2004, pp. 671-675.
    • (2004) Inter. Conference on Networking , pp. 671-675
    • Davis, C.R.1
  • 17
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • R. Mitchell and I. R. Chen, "Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems," IEEE Transactions on Reliability, Vol. 62, no. 1, pp. 199-210, 2013.
    • (2013) IEEE Transactions on Reliability , vol.62 , Issue.1 , pp. 199-210
    • Mitchell, R.1    Chen, I.R.2
  • 18
    • 78751676469 scopus 로고    scopus 로고
    • Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks
    • I. R. Chen, A. P. Speer, and M. Eltoweissy, "Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks," IEEE Trans. on Dependable and Secure Computing, Vol. 8, no. 2, 2011, pp. 161-176.
    • (2011) IEEE Trans. on Dependable and Secure Computing , vol.8 , Issue.2 , pp. 161-176
    • Chen, I.R.1    Speer, A.P.2    Eltoweissy, M.3
  • 19
    • 84879051898 scopus 로고    scopus 로고
    • Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
    • H. Al-Hamadi and LR. Chen, "Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks," IEEE Transactions on Network and Service Management, Vol. 19, no. 2, 2013, pp. 189-203.
    • (2013) IEEE Transactions on Network and Service Management , vol.19 , Issue.2 , pp. 189-203
    • Al-Hamadi, H.1    Chen, L.R.2
  • 20
    • 78751620590 scopus 로고    scopus 로고
    • Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
    • Y. Li and LR. Chen, "Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks," IEEE Transactions on Mobile Computing, Vol. 10, no. 3, 2011, pp. 349-361.
    • (2011) IEEE Transactions on Mobile Computing , vol.10 , Issue.3 , pp. 349-361
    • Li, Y.1    Chen, L.R.2
  • 21
    • 0032121578 scopus 로고    scopus 로고
    • Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
    • LR. Chen and T.H. Hsi, "Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers," Performance Evaluation, Vol. 33, no. 2, pp. 89-112, 1998.
    • (1998) Performance Evaluation , vol.33 , Issue.2 , pp. 89-112
    • Chen, L.R.1    Hsi, T.H.2
  • 22
    • 0037645949 scopus 로고    scopus 로고
    • Dynamic quota-based admission control with sub-rating in multimedia servers
    • S.T. Cheng, CM. Chen, and LR. Chen, "Dynamic quota-based admission control with sub-rating in multimedia servers," Multimedia Systems, Vol. 8, no. 2, pp. 83-91, 2000.
    • (2000) Multimedia Systems , vol.8 , Issue.2 , pp. 83-91
    • Cheng, S.T.1    Chen, C.M.2    Chen, L.R.3
  • 23
    • 0032309753 scopus 로고    scopus 로고
    • Performance evaluation of forwarding strategies for location management in mobile networks
    • I. R. Chen, T.M. Chen, and C. Lee, "Performance evaluation of forwarding strategies for location management in mobile networks," The Computer Journal, Vol. 41, no. 4, 1998, pp. 243-253.
    • (1998) The Computer Journal , vol.41 , Issue.4 , pp. 243-253
    • Chen, I.R.1    Chen, T.M.2    Lee, C.3
  • 24
    • 20844443098 scopus 로고    scopus 로고
    • Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems
    • B. Gu, and I. R. Chen, "Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems," Mobile Networks and Applications, Vol. 10, no. 4, 2005, pp. 453-463.
    • (2005) Mobile Networks and Applications , vol.10 , Issue.4 , pp. 453-463
    • Gu, B.1    Chen, I.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.